skip to main content
10.1145/780542.780592acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article

New degree bounds for polynomial threshold functions

Published:09 June 2003Publication History

ABSTRACT

We give new upper and lower bounds on the degree of real multivariate polynomials which sign-represent Boolean functions. Our upper bounds for Boolean formulas yield the first known subexponential time learning algorithms for formulas of superconstant depth. Our lower bounds for constant-depth circuits and intersections of halfspaces are the first new degree lower bounds since 1968, improving results of Minsky and Papert. The lower bounds are proved constructively; we give explicit dual solutions to the necessary linear programs.

References

  1. D. Angluin. Queries and concept learning. Machine Learning, 2:319--342, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Aspnes, R. Beigel, M. Furst, and S. Rudich. The expressive power of voting polynomials. Combinatorica, 14(2):1--14, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  3. H. Buhrman, R. Cleve, and A. Wigderson. Quantum vs. classical communication and computation. In Proceedings of the 30th Annual ACM Symposium on Theory of Computing, pages 63--68, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. R. Beigel. The polynomial method in circuit complexity. In Proceedings of the Eigth Conference on Structure in Complexity Theory, pages 82--95, 1993.Google ScholarGoogle ScholarCross RefCross Ref
  5. R. Beigel. Perceptrons, PP, and the Polynomial Hierarchy. Computational Complexity, 4:339--349, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R. Beigel, N. Reingold, and D. Spielman. PP is closed under intersection. Journal of Computer and System Sciences, 50(2):191--202, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Bruck. Harmonic analysis of polynomial threshold functions. SIAM Journal on Discrete Mathematics, 3(2):168--177, 1990.Google ScholarGoogle ScholarCross RefCross Ref
  8. E. Cheney. Introduction to approximation theory. McGraw-Hill, New York, New York, 1966.Google ScholarGoogle Scholar
  9. Y. Freund. Boosting a weak learning algorithm by majority. Information and Computation, 121(2):256--285, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Goldmann. On the power of a threshold gate at the top. Information Processing Letters, 63(6):287--293, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Hajnal, W. Maass, P. Pudlak, M. Szegedy, and G. Turan. Threshold circuits of bounded depth. Journal of Computer and System Sciences, 46:129--154, 1993. Google ScholarGoogle ScholarCross RefCross Ref
  12. M. Kearns and U. Vazirani. An introduction to computational learning theory. MIT Press, Cambridge, MA, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Klivans, R. O'Donnell, and R. Servedio. Learning intersections and thresholds of halfspaces. In Proceedings of the Forty-Third Annual Symposium on Foundations of Computer Science, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Klivans and R. Servedio. Learning DNF in time 2Õ(n1/3). In Proceedings of the Thirty-Third Annual Symposium on Theory of Computing, pages 258--265, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Krause and P. Pudlak. Computing Boolean functions by polynomials and threshold circuits. Computational Complexity, 7:346--370, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. N. Littlestone. Learning quickly when irrelevant attributes abound: a new linear-threshold algorithm. Machine Learning, 2:285--318, 1988. Google ScholarGoogle ScholarCross RefCross Ref
  17. N. Linial, Y. Mansour, and N. Nisan Constant depth circuits, Fourier transform and learnability. Journal of the ACM, 40(3):607--620, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. Minsky and S. Papert. Perceptrons: an introduction to computational geometry (expanded edition). MIT Press, Cambridge, MA, 1988.Google ScholarGoogle Scholar
  19. D. J. Newman. Rational approximation to |x|. Michigan Mathematical Journal, 11:11--14, 1964.Google ScholarGoogle ScholarCross RefCross Ref
  20. N. Nisan and M. Szegedy. On the degree of boolean functions as real polynomials. In Proceedings of the Twenty-Fourth Annual Symposium on Theory of Computing, pages 462--467, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. R. Paturi and M. Saks. Approximating threshold circuits by rational functions. Information and Computation, 112(2):257--272, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. M. Saks. Slicing the hypercube. Cambridge University Press, 1993.Google ScholarGoogle ScholarCross RefCross Ref
  23. D. Sieling. Minimization of decision trees is hard to approximate. Technical Report ECCC Report TR02-054, Electronic colloquium on computational complexity, 2002.Google ScholarGoogle Scholar
  24. L. Valiant. A theory of the learnable. Communications of the ACM, 27(11):1134--1142, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. N. Vereshchagin. Lower bounds for perceptrons solving some separation problems and oracle separation of AM from PP. In Proceedings of the Third Annual Israel Symposium on Theory of Computing and Systems, 1995.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. New degree bounds for polynomial threshold functions

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      STOC '03: Proceedings of the thirty-fifth annual ACM symposium on Theory of computing
      June 2003
      740 pages
      ISBN:1581136749
      DOI:10.1145/780542

      Copyright © 2003 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 9 June 2003

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      STOC '03 Paper Acceptance Rate80of270submissions,30%Overall Acceptance Rate1,469of4,586submissions,32%

      Upcoming Conference

      STOC '24
      56th Annual ACM Symposium on Theory of Computing (STOC 2024)
      June 24 - 28, 2024
      Vancouver , BC , Canada

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader